A more efficient implementation of Shor's algorithm
(news.ycombinator.com)
1.
2.
Unverified Evaluations in Dusk's PLONK
(news.ycombinator.com)
3.
Crypto Faces Increased Threat from Quantum Attacks
(spectrum.ieee.org)
5.
A cryptography engineer's perspective on quantum computing timelines
(news.ycombinator.com)
6.
A Cryptography Engineer's Perspective on Quantum Computing Timelines
(news.ycombinator.com)
7.
Drift $280M crypto theft linked to 6-month in-person operation
(bleepingcomputer.com)
8.
Drift loses $280 million as North Korean hackers seize Security Council powers
(bleepingcomputer.com)
9.
Drift loses $280 million North Korean hackers seize Security Council powers
(bleepingcomputer.com)
10.
11.
12.
Securing Elliptic Curve Cryptocurrencies Against Quantum Vulnerabilities [pdf]
(news.ycombinator.com)
13.
An interactive intro to Elliptic Curve Cryptography
(news.ycombinator.com)
14.
Long-Sought Proof Tames Some of Math's Unruliest Equations
(news.ycombinator.com)
15.
16.
What is an elliptic curve? (2019)
(news.ycombinator.com)
17.
18.
19.
North Korean hackers stole over $2 billion in crypto this year
(bleepingcomputer.com)
20.
North Korean hackers increasingly targeting wealthy crypto holders
(feeds.bbci.co.uk)
21.
North Korean hackers stealing record sums, researchers say
(feeds.bbci.co.uk)
22.
23.
25.
Elliptic Curves as Art
(news.ycombinator.com)
26.